#typescript #aliyun #aws #azure #cloud #dependency_injection_container #enterprise #framework #ioc #midway #mircoservices #serverless #serverless_framework #web
https://github.com/midwayjs/midway
https://github.com/midwayjs/midway
GitHub
GitHub - midwayjs/midway: 🍔 A Node.js Serverless Framework for front-end/full-stack developers. Build the application for next…
🍔 A Node.js Serverless Framework for front-end/full-stack developers. Build the application for next decade. Works on AWS, Alibaba Cloud, Tencent Cloud and traditional VM/Container. Super easy inte...
#python #cyber_threat_intelligence #enrichment #free_software #honeynet #incident_response #ioc #observable #osint #osint_python #security_tools #threat_intelligence #threatintel #virustotal
https://github.com/intelowlproject/IntelOwl
https://github.com/intelowlproject/IntelOwl
GitHub
GitHub - intelowlproject/IntelOwl: IntelOwl: manage your Threat Intelligence at scale
IntelOwl: manage your Threat Intelligence at scale - intelowlproject/IntelOwl
#batchfile #ioc #guide #cybersecurity #ransomware #infosec #pentesting #offensive_security #cobalt_strike #pentest_scripts #mitigation #ransomware_detection #redteaming #pentesting_tools
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
GitHub
GitHub - ForbiddenProgrammer/conti-pentester-guide-leak: Leaked pentesting manuals given to Conti ransomware crooks
Leaked pentesting manuals given to Conti ransomware crooks - ForbiddenProgrammer/conti-pentester-guide-leak
#yara #awesome_list #blueteam #blueteam_tools #cti #detection #detection_engineering #dfir #hacktools #incident_response #ioc #iocs #ir #ransomware #redteam #rmm #security #siem #soc #threat_hunting #threat_intelligence
You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.
https://github.com/mthcht/awesome-lists
You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.
https://github.com/mthcht/awesome-lists
GitHub
GitHub - mthcht/awesome-lists: Awesome Security lists for SOC/CERT/CTI
Awesome Security lists for SOC/CERT/CTI. Contribute to mthcht/awesome-lists development by creating an account on GitHub.